Follow
Jordan Shropshire
Jordan Shropshire
Professor of CIS, University of South Alabama
Verified email at southalabama.edu
Title
Cited by
Cited by
Year
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior
J Shropshire, M Warkentin, S Sharma
computers & security 49, 177-191, 2015
3892015
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
M Warkentin, AC Johnston, J Shropshire
European Journal of Information Systems 20, 267-284, 2011
3262011
Continuance of protective security behavior: A longitudinal study
M Warkentin, AC Johnston, J Shropshire, WD Barnett
Decision Support Systems 92, 25-35, 2016
1582016
Knowledge and skill requirements for entry-level IT workers: A longitudinal study
C Aasheim, J Shropshire, L Li, C Kadlec
Journal of Information Systems Education 23 (2), 193-204, 2012
1352012
I’m leaving the IT field: The impact of stress, job insecurity, and burnout on IT professionals
J Shropshire, C Kadlec
International Journal of Information and Communication Technology Research 2 (1), 2012
1222012
Personality and IT security: An application of the five-factor model
J Shropshire, M Warkentin, A Johnston, M Schmidt
AMCIS 2006 Proceedings, 415, 2006
1072006
Podcasting for e‐learning, communication, and delivery
JP Shim, J Shropshire, S Park, H Harris, N Campbell
Industrial Management & Data Systems 107 (4), 587-600, 2007
982007
Where are you going? A comparative analysis of job and career change intentions among USA it workers
J Shropshire, C Kadlec
Journal of Internet Banking and Commerce 17 (2), 1, 2012
952012
Impact of negative message framing on security adoption
JD Shropshire, M Warkentin, AC Johnston
Journal of Computer Information Systems 51 (1), 41-51, 2010
512010
A canonical analysis of intentional information security breaches by insiders
J Shropshire
Information Management & Computer Security 17 (4), 296-310, 2009
512009
Extending the cloud with fog: Security challenges & opportunities
J Shropshire
452014
Best practices in IT disaster recovery planning among US banks
C Kadlec, J Shropshire
Journal of Internet Banking and Commerce 15 (1), 1-11, 2010
302010
The IT security adoption conundrum: An initial step toward validation of applicable measures
M Warkentin, J Shropshire, A Johnston
AMCIS 2007 Proceedings, 276, 2007
262007
Insight from a docker container introspection
T Watts, RG Benton, WB Glisson, J Shropshire
Hawaii International Conference on System Sciences 2019, 2019
232019
Analysis of monolithic and microkernel architectures: Towards secure hypervisor design
J Shropshire
2014 47th Hawaii International Conference on System Sciences, 5008-5017, 2014
222014
Breakpoints: An analysis of potential hypervisor attack vectors
L Turnbull, J Shropshire
2013 Proceedings of IEEE Southeastcon, 1-6, 2013
212013
Developing the IT disaster recovery planning construct
J Shropshire, C Kadlec
Journal of Information Technology Management 20 (4), 37, 2009
212009
Perceived value of podcasting: Student communication-medium preferences
JP Shim, J Shropshire, S Park, H Harris, N Campbell
212006
Uncertainty, personality, and attitudes toward DevOps
J Shropshire, P Menard, B Sweeney
142017
Rootkit detection through phase-space analysis of power voltage measurements
JA Dawson, JT McDonald, J Shropshire, TR Andel, P Luckett, L Hively
2017 12th International Conference on Malicious and Unwanted Software …, 2017
122017
The system can't perform the operation now. Try again later.
Articles 1–20